Guide to Computer Network Security

Nonfiction, Computers, Database Management, Information Storage & Retrievel, Business & Finance, Industries & Professions, Information Management, General Computing
Cover of the book Guide to Computer Network Security by Joseph Migga Kizza, Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Joseph Migga Kizza ISBN: 9783319556062
Publisher: Springer International Publishing Publication: April 24, 2017
Imprint: Springer Language: English
Author: Joseph Migga Kizza
ISBN: 9783319556062
Publisher: Springer International Publishing
Publication: April 24, 2017
Imprint: Springer
Language: English

This fully revised and updated new edition of the definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the technology we depend on. Topics and features: highlights the magnitude of the vulnerabilities, weaknesses and loopholes inherent in computer networks; discusses how to develop effective security solutions, protocols, and best practices for the modern computing environment; examines the role of legislation, regulation, and enforcement in securing computing and mobile systems; describes the burning security issues brought about by the advent of the Internet of Things and the eroding boundaries between enterprise and home networks (NEW); provides both quickly workable and more thought-provoking exercises at the end of each chapter, with one chapter devoted entirely to hands-on exercises; supplies additional support materials for instructors at an associated website.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This fully revised and updated new edition of the definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the technology we depend on. Topics and features: highlights the magnitude of the vulnerabilities, weaknesses and loopholes inherent in computer networks; discusses how to develop effective security solutions, protocols, and best practices for the modern computing environment; examines the role of legislation, regulation, and enforcement in securing computing and mobile systems; describes the burning security issues brought about by the advent of the Internet of Things and the eroding boundaries between enterprise and home networks (NEW); provides both quickly workable and more thought-provoking exercises at the end of each chapter, with one chapter devoted entirely to hands-on exercises; supplies additional support materials for instructors at an associated website.

More books from Springer International Publishing

Cover of the book Lipids and Skin Health by Joseph Migga Kizza
Cover of the book Innovative Research Methodologies in Management by Joseph Migga Kizza
Cover of the book Non-traditional Micromachining Processes by Joseph Migga Kizza
Cover of the book Determinants of Economic Growth in Africa by Joseph Migga Kizza
Cover of the book Heat Transfer Enhancement in Plate and Fin Extended Surfaces by Joseph Migga Kizza
Cover of the book Computations and Combinatorics in Commutative Algebra by Joseph Migga Kizza
Cover of the book Atomic Diffusion in Stars by Joseph Migga Kizza
Cover of the book Modern Cold Spray by Joseph Migga Kizza
Cover of the book The Dialogical Self Theory in Education by Joseph Migga Kizza
Cover of the book Umbilical Cord Blood Banking and Transplantation by Joseph Migga Kizza
Cover of the book Exploring Emotions, Aesthetics and Wellbeing in Science Education Research by Joseph Migga Kizza
Cover of the book Patch-Based Techniques in Medical Imaging by Joseph Migga Kizza
Cover of the book Teaching Narrative by Joseph Migga Kizza
Cover of the book Proper Generalized Decompositions by Joseph Migga Kizza
Cover of the book Handbook of Insulin Therapies by Joseph Migga Kizza
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy